Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

NSK101 Netskope Certified Cloud Security Administrator (NCCSA) Questions and Answers

Questions 4

Exhibit

A user is connected to a cloud application through Netskope's proxy.

In this scenario, what information is available at Skope IT? (Choose three.)

Options:

A.

username. device location

B.

destination IP. OS patch version

C.

account instance, URL category

D.

user activity, cloud app risk rating

E.

file version, shared folder

Buy Now
Questions 5

A company user cannot open a sports news site. You want to review the category of the website and see how the rules are applied even though this category is allowed. In this scenario, which action will accomplish this task?

Options:

A.

Use the Forensic profile

B.

Use www.netskope.com/url-lookup.

C.

Use the URL Lookup page in the dashboard.

D.

Verify with your own computer and use Advanced Debugging.

Buy Now
Questions 6

Which two statements describe a website categorized as a domain generated algorithm (DGA)? (Choose two.)

Options:

A.

The website is used for domain registration.

B.

The domain contains malicious algorithms.

C.

The website is used to hide a command-and-control server.

D.

The domain was created by a program.

Buy Now
Questions 7

Which two functions are available for both inline and API protection? (Choose two.)

Options:

A.

multi-factor authentication

B.

threat protection

C.

DLP

D.

Cloud Security Posture Management (CSPM)

Buy Now
Questions 8

Which Netskope component would an administrator use to see an overview of private application usage and performance?

Options:

A.

Digital Experience Management

B.

Publishers page

C.

Incident Management

D.

Cloud Exchange

Buy Now
Questions 9

Your department is asked to report on GDPR data publicly exposed in Microsoft 365, Salesforce. and Slack-sanctioned cloud applications. Which deployment model would you use to discover this data?

Options:

A.

reverse proxy

B.

on-premises appliance

C.

API-enabled protection

D.

inline protection

Buy Now
Questions 10

Which three statements are correct about Netskope's NewEdge Security Cloud Network Infrastructure? (Choose three.)

Options:

A.

It takes advantage of the public cloud by deploying security services on Google Cloud Platform.

B.

It includes direct peering with Microsoft and Google in every data center.

C.

It is a private security cloud network that is massively over provisioned, highly elastic, and built for scale.

D.

It delivers a single, unified network with no surcharges or reliance on public cloud infrastructure or virtual PoPs.

E.

It simplifies the administrator's job by limiting access to pre-defined availability zones.

Buy Now
Questions 11

You are asked to review files affected by malware in your organization. In this scenario, which two actions are possible and would be accessible from the Netskope UI -> Incidents --> Malware? (Choose two)

Options:

A.

Download the original malware file generating the alert to be analyzed by the SOC team

B.

Identify the exposure of the file identified as malware.

C.

Remediate the compromised devices.

D.

Determine the Detection Engine used to identify the malware.

Buy Now
Questions 12

What are two uses for deploying a Netskope Virtual Appliance? (Choose two.)

Options:

A.

as an endpoint for Netskope Private Access (NPA)

B.

as a local reverse-proxy to secure a SaaS application

C.

as a log parser to discover in-use cloud applications

D.

as a Secure Forwarder to steer traffic

Buy Now
Questions 13

Which two traffic steering configurations are supported by Netskope? (Choose two.)

Options:

A.

browser isolation traffic only

B.

cloud applications only

C.

all Web traffic including cloud applications

D.

Web traffic only

Buy Now
Questions 14

Click the Exhibit button.

You configured a set of Cloud Firewall policies as shown in the exhibit and changed your Steering Configuration to All Traffic for Group A and Group B. Users in Group A report that they are unable to access a third-party server using TCP port 3389. Referring to the exhibit, which action correctly describes how you would allow these connections without allowing unnecessary access?

Options:

A.

Add Group A to the Group B Allow policy.

B.

Create an Allow policy using a custom application including the destination IP and TCP port 3389.

C.

Move the Group B Allow policy above the Group A Allow policy.

D.

Change the default action to Allow.

Buy Now
Questions 15

A Netskope administrator wants to create a policy to quarantine files based on sensitive content.

In this scenario, which variable must be included in the policy to achieve this goal?

Options:

A.

Organizational Unit

B.

Cloud Confidence Index level

C.

DLP Profile

D.

Threat Protection Profile

Buy Now
Questions 16

Click the Exhibit button.

The exhibit shows security rules that are part of which component of the Netskope platform?

Options:

A.

Real-time Protection

B.

Advanced Malware Protection

C.

Security Posture

D.

Behavior Analytics

Buy Now
Questions 17

What are two correct methods to gather logs from the Netskope Client? (Choose two.)

Options:

A.

From the Netskope Console in the device detail view, select Collect Log.

B.

Right-click on the Netskope task tray icon and click Save Logs...

C.

Open the Netskope Client application and click the Advanced Debugging button.

D.

Search for the systeminfo.log file in Explorer and submit the results.

Buy Now
Questions 18

What are two characteristics of Netskope's Private Access Solution? (Choose two.)

Options:

A.

It provides protection for private applications.

B.

It provides access to private applications.

C.

It acts as a cloud-based firewall.

D.

It requires on-premises hardware.

Buy Now
Questions 19

You investigate a suspected malware incident and confirm that it was a false alarm.

Options:

A.

In this scenario, how would you prevent the same file from triggering another incident?

B.

Quarantine the file. Look up the hash at the VirusTotal website.

C.

Export the packet capture to a pcap file.

D.

Add the hash to the file filter.

Buy Now
Questions 20

You want to take into account some recent adjustments to CCI scoring that were made in your Netskope tenant.

In this scenario, which two CCI attributes in the Ul would be used in a Real-time Protection policy? (Choose two.)

Options:

A.

Domains

B.

App Tag

C.

CCL Level

D.

GDPR Readiness

Buy Now
Questions 21

You need to block all users from uploading data files into risky collaboration applications. Which element must you configure within Netskope's CASB to accomplish this task?

Options:

A.

DLP Rule

B.

real-time policy

C.

DLP Profile

D.

block notification

Buy Now
Questions 22

You want to set up a Netskope API connection to Box.

What two actions must be completed to enable this connection? (Choose two.)

Options:

A.

Install the Box desktop sync client.

B.

Authorize the Netskope application in Box.

C.

Integrate Box with the corporate IdP.

D.

Configure Box in SaaS API Data protection.

Buy Now
Questions 23

Click the Exhibit button.

Referring to the exhibit, you have a user reporting that a blocked website is needed for legitimate business reasons. Upon review, you determine that the user has been blocked by the Global Block policy. You need to create an exception forthat domain. You create a custom URL list that includes the domain.

In this scenario, which two actions would allow this access? (Choose two.)

Options:

A.

Create a custom category with the custom URL list as an included URL list and add it to an allow policy below the triggered Global Block policy.

B.

Create a custom category with the custom URL list as an included URL list and add it to an allow policy above the triggered Global Block policy.

C.

Add the custom URL list as an excluded URL list to the category in the Global Allow policy.

D.

Add the custom URL list as an excluded URL list to the category in the Global Block policy.

Buy Now
Questions 24

Digital Experience Management (DEM) allows an administrator to monitor which two areas? (Choose two.)

Options:

A.

User activities

B.

Bandwidth consumption

C.

Information on triggered policies

D.

Client steering data

Buy Now
Questions 25

What are two primary advantages of Netskope's Secure Access Service Edge (SASE) architecture? (Choose two.

Options:

A.

no on-premises hardware required for policy enforcement

B.

Bayesian spam filtering

C.

Endpoint Detection and Response (EDR)

D.

single management console

Buy Now
Questions 26

Which statement is correct about Netskope's Instance Awareness?

Options:

A.

It prevents users from browsing the Internet using outdated Microsoft Internet Explorer but allows them access if they use the latest version of Microsoft Edge.

B.

It identifies that a form hosted in Microsoft Forms belongs to the corporate Microsoft 365 tenant and not a tenant from a third party.

C.

It differentiates personal code from work-related code being uploaded to GitHub.

D.

It identifies if e-mails are being sent using Microsoft 365 through Outlook, Thunderbird, or the Web application in outlook.com.

Buy Now
Questions 27

Which two statements are correct about DLP Incidents in the Netskope platform? (Choose two.)

Options:

A.

An incident can be associated to one or more DLP policies.

B.

An incident can have one or more DLP violations.

C.

An incident can be assigned to one or more administrators.

D.

An incident can be associated to one or more DLP rules.

Buy Now
Questions 28

You are working with traffic from applications with pinned certificates. In this scenario, which statement is correct?

Options:

A.

An exception should be added to the steering configuration.

B.

The domains used by certificate-pinned applications should be added to the authentication bypass list.

C.

Traffic with pinned certificates should be blocked.

D.

The domains used by applications with pinned certificates should be allowed in an inline policy.

Buy Now
Questions 29

Which two statements are correct about Netskope’s NewEdge Security Cloud Network Infrastructure? (Choose two.)

Options:

A.

It utilizes virtual POPs for traffic onboarding ensuring low latency.

B.

It includes direct peering with Microsoft and Google in every data center.

C.

It is a private security cloud network that is over-provisioned, elastic, and built for scale.

D.

It utilizes multiple public cloud providers for inline services ensuring high availability and elasticity.

Buy Now
Questions 30

Click the Exhibit button.

Referring to the exhibit, what are two recommended steps to be set on the perimeter device to monitor IPsec tunnels to a Netskope data plane? (Choose two.)

Options:

A.

Enable IKE Dead Peer Detection (DPD) for each tunnel.

B.

Send ICMP requests to the Netskope location's Probe IP

C.

Send HTTP requests to the Netskope location's Probe IP.

D.

Send ICMP requests to the Netskope location's proxy IPs.

Buy Now
Questions 31

You just deployed the Netskope client in Web mode and several users mention that their messenger application is no longer working. Although you have a specific real-time policy that allows this application, upon further investigation you discover that it is using proprietary encryption. You need to permit access to all the users and maintain some visibility.

In this scenario, which configuration change would accomplish this task?

Options:

A.

Change the real-time policy to block the messenger application.

B.

Create a new custom cloud application using the custom connector that can be used in the real-time policy.

C.

Add a policy in the SSL decryption section to bypass the messenger domain(s).

D.

Edit the steering configuration and add a steering exception for the messenger application.

Buy Now
Questions 32

What is the limitation of using a legacy proxy compared to Netskope's solution?

Options:

A.

Netskope architecture requires on-premises components.

B.

Legacy solutions offer higher performance and scalability for corporate and remote users.

C.

Legacy on-premises solutions fail to provide protection for traffic from on-premises users.

D.

To enforce policies, traffic needs to traverse back through a customer's on-premises security stack.

Buy Now
Questions 33

Your company asks you to obtain a detailed list of all events from the last 24 hours for a specific user. In this scenario, what are two methods to accomplish this task? (Choose two.)

Options:

A.

Use the Netskope reporting engine.

B.

Export the data from Skope IT Application Events.

C.

Use the Netskope REST API.

D.

Export the data from Skope IT Alerts.

Buy Now
Questions 34

What are two uses for deploying a Netskope Virtual Appliance? (Choose two.)

Options:

A.

to use as a log parser to discover in-use cloud applications

B.

to use as a local reverse proxy to secure a SaaS application

C.

to use as an endpoint for Netskope Private Access (NPA)

D.

to use as a secure way to generate Exact Data Match hashes

Buy Now
Questions 35

When using an out-of-band API connection with your sanctioned cloud service, what are two capabilities available to the administrator? (Choose two.)

Options:

A.

to quarantine malware

B.

to find sensitive content

C.

to block uploads

D.

to allow real-time access

Buy Now
Questions 36

You have applied a DLP Profile to block all Personally Identifiable Information data uploads to Microsoft 365 OneDrive. DLP Alerts are not displayed and no OneDrive-related activities are displayed in the Skope IT App Events table.

In this scenario, what are two possible reasons for this issue? (Choose two.)

Options:

A.

The Cloud Storage category is in the Steering Configuration as an exception.

B.

The destination domain is excluded from decryption in the decryption policy.

C.

A Netskope POP is not in your local country and therefore DLP policies cannot be applied.

D.

DLP policies do not apply when using IPsec as a steering option.

Buy Now
Questions 37

Your company started deploying the latest version of the Netskope Client and you want to track the progress and device count using Netskope.

Which two statements are correct in this scenario? (Choose two.)

Options:

A.

Use Netskope Digital Experience Management to monitor the status.

B.

Use the Devices page under Settings to view and filter the required data.

C.

Review the Group definitions under Settings to determine the number of deployed clients.

D.

Review the Steering Configuration to determine the number of deployed clients.

Buy Now
Questions 38

Your company has implemented Netskope's Cloud Firewall and requires that all FTP connections are blocked regardless of the ports being used.

Which two statements correctly identify how to block FTP access? (Choose two.)

Options:

A.

Create a Real-time Protection policy with FTP as the destination application and Block as the action.

B.

Create a Real-time Protection policy with a custom Firewall App Definition for TCP port 21 as the destination application and Block as the action.

C.

Ensure there are no Real-time Protection polices that allow FTP and change the default non-Web action to Block.

D.

Create a custom Firewall App Definition for TCP port 21 and add it to the default tenant Steering Configuration as an exception.

Buy Now

NCCSA |

Exam Code: NSK101
Exam Name: Netskope Certified Cloud Security Administrator (NCCSA)
Last Update: Nov 24, 2024
Questions: 129
NSK101 pdf

NSK101 PDF

$25.5  $84.99
NSK101 Engine

NSK101 Testing Engine

$30  $99.99
NSK101 PDF + Engine

NSK101 PDF + Testing Engine

$40.5  $134.99